Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Size: px
Start display at page:

Download "Performance Evaluation of Scheduling Mechanisms for Broadband Networks"

Transcription

1 Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas Committee: Dr. David W. Petr (Chair) Dr. Joseph B. Evans Dr. David L. Andrews Information & Telecommunications Technology Center (ITTC), EECS, University of Kansas

2 Abbreviations HF 2 Q - Hybrid FIFO Fair Queuing WFQ - Weighted Fair Queuing FIFO - First In First Out GPS - Generalized Processor Sharing BWA - Broadband Wireless Access DOCSIS - Data Over Cable Service Interface Specification MAC - Medium Access Control QoS - Quality of Service 2

3 Presentation Outline Introduction & Motivation Scheduling Mechanisms & Fair queuing Description of HF 2 Q Performance Characterization of HF 2 Q DOCSIS 1.1 Operation Performance Evaluation of DOCSIS 1.1 Summary of Results Contributions & Future Work 3

4 Introduction & Motivation Future broadband networks will support multiple types of traffic over single physical infrastructure Issue of scheduling mechanisms and bandwidth allocation play a critical role Packet Fair Queuing algorithms have received a lot of attention Hybrid FIFO Fair Queuing (HF 2 Q) a new queuing discipline Has very interesting properties and hence a performance characterization would prove worthwhile 4

5 Introduction & Motivation (cont.) DOCSIS de facto standard for delivering broadband services over HFC networks, defines MAC scheduling mechanisms for BWA, developed by CableLabs The IEEE protocol was developed for Broadband Wireless Access (BWA) systems to provide Internet access and multimedia services to end users. Consolidation of two proposals, one of which was based on DOCSIS 1.1 DOCSIS 1.1 built on top of DOCSIS 1.0, specifies QoS components in terms of MAC scheduling based on underlying traffic requirements Standardized in 2001 a performance evaluation is significant in terms of understanding the operation of the protocol as such and its new QoS features 5

6 Scheduling Mechanisms and Fair Queuing Queuing algorithms determine the way packets from different sources interact Controls order in which packets are sent In the classic FIFO the order of arrival completely determines bandwidth allocation Fair in the sense that all packets get equal mean waiting times Protection against ill-behaved sources is required and hence the requirement of an algorithm that provides fair bandwidth allocation A class of fair queuing algorithms have been proposed since then 6

7 Background on FQ policies FQ algorithms maintain separate queues for packets from individual sources Queues are serviced in a round robin manner Provide fair treatment for supported flows by splitting bandwidth based on pre-defined weights Fairness Criterion : For any two backlogged flows, each flow s service (normalized to its weight) should be nearly the same 7

8 Weighted Fair Queuing WFQ is a packet scheduling technique allowing guaranteed bandwidth services WFQ is a GPS approximation for packet networks GPS is an idealized fluid model that cannot be implemented practically The time at which a packet would complete service in GPS is computed and the packet is assigned a timestamp Timestamps are virtual finish times Packets are served in increasing order of their timestamps 8

9 WFQ : Virtual time WFQ operation linked to the GPS system using virtual time defines the order in which packets are served Virtual time v(t) is a piecewise linear increasing function of time v(t) x x x x x Has a rate of increase inversely proportional to the sum of the service rates of the backlogged flows C v( t2) v( t1) =.( t2 t1) r t k B( t 1, t k ) 2 9

10 WFQ : Virtual Start and Finish Times i th packet of flow k is denoted by p ki, its arrival time by a ki and its length by L k i v(a ki ) is the value of v(t) at the time of packet arrival Virtual finish times are assigned as shown Virtual start time denoted by S i k varies depending on whether a new arrival is to an empty flow or backlogged flow WFQ serves packets in increasing order of finish times 10

11 HF 2 Q description A new and an interesting queuing algorithm discovered while developing the WFQ simulation model A small change in the WFQ operation leads to HF 2 Q Named Hybrid FIFO Fair Queuing since it exhibits desirable properties of both FIFO and WFQ Exhibits FIFO behavior when the total system load is less than unity Behaves as WFQ when the system is overloaded 11

12 HF 2 Q implementation v(t) represented by roundnumber ( currenttime lastrupdatetime) roundnumbe r = roundnumber +. capacity weightsum Instants when the roundnumber (v(t)) is updated is kept track of using a variable lastrupdatetime The lastrupdatetime is not updated when a new packet arrives after an idle period in HF 2 Q Scheduling order thus changes 12

13 HF 2 Q vs. WFQ Virtual Time τ e - end of a server busy period, τ s - instant when the first packet arrives after an idle period from flow a 1, τ 2 - the instant of arrival of second packet Offset between v(t) and v (t) v (t) The new arrival at τ 2 gets assigned v (t) in HF 2 Q rather than v(t) in WFQ Virtual time v(t) Slope C r a1 τ e τ s τ 2 t 13

14 Performance Characterization Delay and throughput characteristics were studied and comparisons where made with WFQ Simulations were performed using Extend, using discrete event simulation techniques Link speed of 1Mbps, mean packet lengths of 8000 bits (uniformly distributed service times) Poisson arrivals with exponential inter-arrival times were used All experiments were performed with three flows, with flow 1 always being the tagged flow (i.e. the flow whose load is varied) 14

15 Delay Results :HF 2 Q: Load < 1 The three flows had reservations of 0.2, 0.7 & 0.1 Mbps respectively The tagged flow load was varied and the incoming loads of flows 2 & 3 were 0.09 Mbps The tagged flow exceeds its reservation after a load of 0.2 Mbps Mean Delay (s) It is seen that HF Q behaves as 0.01 FIFO offering equal mean 0 waiting times for all flows Mean Delay for various incoming loads of tagged flow Flow 1 Flow 2 Flow 3 Incoming load for tagged flow (Mb/s) 15

16 Delay Results :WFQ: Load < 1 Same reservations and incoming loads were maintained for all flows It is observed that WFQ offers protection to the well-behaved flows (2 & 3) The delay of the tagged flow increases after it exceeds its reservation Flow 2 gets a lower delay compared to flow 3 since its reservation is higher Mean Delay (s) Flow 1 Flow 2 Flow 3 Mean Delay for various incoming loads of tagged flow Incoming load for tagged flow (Mb/s) 16

17 Delay Results :HF 2 Q: Load > 1 The tagged flow was increased so that the system load reaches 116% The delay of the tagged flow is not shown since it increases infinitely As is seen, the delay of the other two flows is low and bounded after a small transitional period As will be shown, HF 2 Q exhibits WFQ behavior after the transitional period Mean Delay (s) Mean Delay for various incoming loads of tagged flow Incoming load for tagged flow (Mb/s) Flow 2 Flow 3 17

18 Delay Results (Load > 1 cont.) Result for HF 2 Q (after the transitional region) Result for WFQ (after the transitional region) 0.03 Mean Delay for various incoming loads of tagged flow Mean Delay for various incoming loads of tagged flow Flow 2 Flow Mean Delay (s) Mean Delay (s) Flow 2 Flow Incoming load for tagged flow (Mb/s) Incoming load for tagged flow (Mb/s) 18

19 Throughput Experiment Throughput - fraction of link capacity used to carry packets Three flows with reservations of 0.5, 0.3 & 0.2 Mbps Flows 2 & 3 had incoming loads of 0.4 & 0.5 Mpbs respectively Flows 2 & 3 heavily exceed their reservation The system is overloaded after the incoming load of the tagged flow exceeds 0.1 Mbps The throughput behavior of FIFO, HF 2 Q and WFQ were studied 19

20 Throughput Results - FIFO All work conserving algorithms provide throughput equal to the incoming load when the total system load is less than unity When the system is overloaded FIFO offers throughput proportional to offered load WFQ and HF 2 Q on the other hand protects the wellbehaving 0.1 flows Normalized throughput Throughput vs Incoming load of tagged flow Incoming load of tagged flow (Mb/s) Flow 1 Flow 2 Flow 3 20

21 Throughput Results HF 2 Q & WFQ HF 2 Q WFQ Flow 1 Flow 2 Flow 3 Throughput vs Incoming load of tagged flow Throughput vs Incoming load of tagged flow Flow 1 Flow 2 Flow 3 Normalized throughput Normalized throughput Incoming load of tagged flow (Mb/s) Incoming load of tagged flow (Mb/s) 21

22 Conclusions Drawn HF 2 Q services packets in FIFO order when the total system load is less than one Indicated by equal mean waiting times Verified via simulations with packet sequence numbers Initial start-up period when ordering is not FIFO HF 2 Q services packets as WFQ does when heavily overloaded Transitional period when the load is barely over unity 22

23 DOCSIS Introduction In DOCSIS a Cable Modem Termination System (CMTS) controls the operations of many terminating Cable Modems (CMs). Upstream and downstream channels are separated using FDD. Each upstream channel is further divided into a stream of fixed-size time minislots (TDMA). DOCSIS MAC utilizes a request/grant mechanism to coordinate transmission between multiple CMs. 23

24 DOCSIS Operation 24

25 Request Mechanisms Contention - the CM may transmit a request in the contention period Piggybacking - is a request for additional bandwidth sent in a data transmission Unsolicited grants fixed size grants offered in a periodic basis Unicast request polls - unicast request opportunities are sent as a means of real-time polls regardless of network congestion 25

26 DOCSIS 1.1 QoS Classes Unsolicited Grant Service (UGS) Offers fixed unsolicited size grants on periodic basis Designed for fixed size data packet flows on fixed intervals Real Time Polling Service (rtps) Designed to support real-time flows that generate variable size packets on a periodic basis Offers periodic unicast polls that allow CM to specify the size of the desired grant 26

27 DOCSIS 1.1 QoS Classes (cont.) Non Real Time Polling Service (nrtps) Designed to support non-real time flows that require variable size grants on a regular basis Offers unicast polls on a regular basis and CMs are allowed to use contention opportunities and piggybacking Best Effort (BE) Service Provides efficient service to Best Effort Traffic Uses contention and piggybacking for requests Limited QoS Support 27

28 Performance Evaluation of DOCSIS 1.1 QoS Key performance attribute studied - Mean Access Delay Simulations were done in OPNET Comparison of BE and UGS performance Effect of DOCSIS 1.1 QoS features on performance Fragmentation - sending a portion of packet frame during a reserved slot time Concatenation - sending more than a frame during a transmission opportunity Piggybacking - a request carried in the next outgoing data frame Traffic Priority - CMTS uses Traffic Priority attribute for determining precedence in grant generation 28

29 Experiment 1: Comparison of Best Effort & UGS Delays UGS UGS flows are allowed to reserve certain portion of the bandwidth No transmission requests are needed; hence low, constant access delay BE request grant,request grant pattern Has to contend for sending requests May result in collision and thus increased delay due to retransmissions Piggybacking: requests are piggybacked to outgoing data and thus delay is reduced 29

30 Experiment 1: Comparison of Best Effort & UGS Delays (cont.) Load increased by adding BE stations Fragmentation & Concatenation were disabled Exponential packet lengths & inter-arrival times Backoff start = 7 30

31 Experiment 2: Effect of Fragmentation & Concatenation Load was increased by adding BE stations Exponential Packet Lengths and Exponential Inter-Arrival Times Fragmentation & Concatenation improve performance considerably Piggybacking was enabled;backoff start =7 31

32 Contention Resolution Algorithm (CRA) Overview CRA triggered by request collision Supported CRA: Truncated Binary Exponential Back-off Specified by an initial backoff window (Back-off start) and a maximum back-off (Back-off End) CM randomly selects a value within its back-off window - [0,2 Backoff ] Random number indicates the number of contention opportunities the CM must defer before transmitting requests On collision, increases the back-off window by a factor of 2 (less than back-off end) and repeats deferring process 32

33 Experiment 3: Effect of Backoff Start on Collision (piggybacking disabled) Packet lengths and interarrival times were made constant Since Piggybacking is disabled, collision probability increases with load As backoff start value increases, collision probability decreases 33

34 Experiment 3: Effect of Backoff Start on Collision (piggybacking enabled) Less Collision probability compared to the piggybacking disabled case since frequent contention is not necessary As load increases, collision probability decreases since contention load decreases 34

35 Experiment 3: Effect of Backoff Start on Delay Backoff 0 suffers maximum delay Backoff 4 produces a marked improvement in performance Backoff 7: reduced collision is offset by longer backoff delay 35

36 Experiment 4: Effect of Traffic Priorities on Delay CMTS uses Traffic Priority attribute for determining precedence in grant generation Priorities do not affect contention Traffic Priorities range from 0-7 applicable to BE, rtps & nrtps, 0 being the highest Hence high priority stations have lower access delays 36

37 Summary of Results Performance Evaluation of HF 2 Q HF 2 Q behaves as FIFO when the total system load is less than 1 Behaves as WFQ when the system is heavily overloaded Throughput behavior of HF 2 Q confirms these properties DOCSIS 1.1 UGS always receives bounded delay characteristics Fragmentation and Concatenation improve performance when system is overloaded Piggybacking improves delay characteristics CRA plays an important role in BE performance Traffic priority has significant effect on BE performance 37

38 Contributions & Future Work Performance characterization of a new queuing discipline -HF 2 Q was done Performance evaluation of DOCSIS QoS Scope for future work with regard to HF 2 Q Analytic explanation as to why HF 2 Q behaves as FIFO in an underloaded case Finding a closed form expression for the mean waiting time for WFQ Performance evaluation studies of two other traffic classes that DOCSIS 1.1 mentions namely rtps and nrtps yet to be done 38

39 Discussion Thank you! 39

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation

More information

DOWNSTREAM RESOURCE ALLOCATION IN DOCSIS 3.0 CHANNEL BONDED NETWORKS

DOWNSTREAM RESOURCE ALLOCATION IN DOCSIS 3.0 CHANNEL BONDED NETWORKS Clemson University TigerPrints All Dissertations Dissertations 8-2011 DOWNSTREAM RESOURCE ALLOCATION IN DOCSIS 3.0 CHANNEL BONDED NETWORKS Scott Moser Clemson University, smoser@clemson.edu Follow this

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued

More information

IEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols

IEEE Broadband Wireless Access Working Group <  Evaluation Procedure for MAC Protocols Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Evaluation Procedure for 802.16 MAC Protocols 2000-04-25 Source Hoon Choi Natl. Inst. of Standards

More information

The Interaction Between the DOCSIS 1.1/2.0 MAC Protocol and TCP Application Performance

The Interaction Between the DOCSIS 1.1/2.0 MAC Protocol and TCP Application Performance The Interaction Between the DOCSIS /20 MAC Protocol and TCP Application Performance Jim Martin jimmartin@csclemsonedu Department of Computer Science Clemson University Abstract- The deployment of data-over-cable

More information

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service A Heuristic Strategy for IEEE 802.16 WiMAX scheduler for Quality of Service G.S. Paschos, I. Papapanagiotou, C.G. Argyropoulos and S.A. Kotsopoulos Wireless Telecommunication Laboratory Electrical and

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Packet Scheduling and QoS

Packet Scheduling and QoS Packet Scheduling and QoS EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Thursday Oct 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Packet

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Congestion Control and Resource Allocation Lecture material taken from Computer Networks A Systems Approach, Third Edition,Peterson and Davie, Morgan Kaufmann, 2007. Advanced Computer Networks Congestion

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

A QoS aware Packet Scheduling Scheme for WiMAX

A QoS aware Packet Scheduling Scheme for WiMAX A QoS aware Packet Scheduling Scheme for WiMAX Mahasweta Sarkar and Harpreet Sachdeva ABSTRACT WiMAX is one of the most promising broadband wireless technologies today. The WiMAX standard-802.16-is designed

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

Dimensioning the Contention Channel of DOCSIS Cable Modem Networks

Dimensioning the Contention Channel of DOCSIS Cable Modem Networks Dimensioning the Contention Channel of DOCSIS Cable Modem Networks J. Lambert, B. Van Houdt, and C. Blondia University of Antwerp, Department of Mathematics and Computer Science, Performance Analysis of

More information

Validating an ns Simulation Model of the DOCSIS Protocol

Validating an ns Simulation Model of the DOCSIS Protocol Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall Department of Computer Science Clemson University {jim.martin,westall}@cs.clemson.edu Keywords: Simulation, broadband access,

More information

Modeling The DOCSIS 1.1/2.0 MAC Protocol

Modeling The DOCSIS 1.1/2.0 MAC Protocol Modeling The DOCSIS 11/20 MAC Protocol Jim Martin Department of Computer Science Clemson University Clemson, SC jimmartin@csclemsonedu Abstract We have developed a model of the Data over Cable (DOCSIS)

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Validating an ns Simulation Model of the DOCSIS Protocol

Validating an ns Simulation Model of the DOCSIS Protocol Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-974 jimmartin@csclemsonedu Abstract-- The number of households and

More information

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1 Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control

More information

Delay Analysis of IEEE Wireless Metropolitan Area Network

Delay Analysis of IEEE Wireless Metropolitan Area Network Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL

CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL V. Rangel 1, R. Edwards 1, and K. Schunke 2 1 C4MCR, University of Sheffield, UK and 2 ICT, Braunschweig Technical University,

More information

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Validating an ns Simulation Model of the DOCSIS Protocol

Validating an ns Simulation Model of the DOCSIS Protocol Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall Department of Computer Science Clemson University Clemson, SC 29634-974 jim.martin,westall@cs.clemson.edu Abstract-- The

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

How DOCSIS Protocol Solves Asymmetric Bandwidth Issue in Cable Network

How DOCSIS Protocol Solves Asymmetric Bandwidth Issue in Cable Network Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 55 62 (2006) 55 How DOCSIS Protocol Solves Asymmetric Bandwidth Issue in Cable Network Wei-Tsong Lee 1, Kuo-Chih Chu 2 *, Chin-Ping Tan 3 and

More information

New Contention Resolution Schemes for WiMAX

New Contention Resolution Schemes for WiMAX New Contention Resolution Schemes for WiMAX Jesús Delicado,QiangNi, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad de Castilla La

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Congestion Control 3/16/09

Congestion Control 3/16/09 Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Upstream Channel Bonding

Upstream Channel Bonding The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency (RF) channels to form a larger bonding group at the MAC layer.

More information

Upstream Channel Bonding

Upstream Channel Bonding The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency (RF) channels to form a larger bonding group at the MAC layer.

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

Experimental Evaluation of DOCSIS 1.1 Upstream Performance. Chaitanya K. Godsay

Experimental Evaluation of DOCSIS 1.1 Upstream Performance. Chaitanya K. Godsay Experimental Evaluation of DOCSIS. Upstream Performance BY Chaitanya K. Godsay B.E., University of Pune, India (999) THESIS Submitted to the University of New Hampshire in partial fulfillment of the requirements

More information

Bandwidth Allocation for Quality of Service Provision in IEEE Systems

Bandwidth Allocation for Quality of Service Provision in IEEE Systems Bandwidth Allocation for Quality of Service Provision in IEEE 802.16 Systems Tze Wei Tang Thesis submitted for the degree of Doctor of Philosophy in Electrical and Electronic Engineering at The University

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency

More information

CN R G. Empirical Evaluation of Upstream Throughput in a DOCSIS Access Network. Swapnil Bhatia (with Radim Bartoš and Chaitanya Godsay)

CN R G. Empirical Evaluation of Upstream Throughput in a DOCSIS Access Network. Swapnil Bhatia (with Radim Bartoš and Chaitanya Godsay) Empirical Evaluation of Upstream Throughput in a DOCSIS Access Network Swapnil Bhatia (with Radim Bartoš and Chaitanya Godsay) Computer Networks Research Group Department of Computer Science and CN R G

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Latency in DOCSIS Networks

Latency in DOCSIS Networks Latency in DOCSIS Networks Greg White Sept. 26, 2013 The various DOCSIS versions From a latency perspective DOCSIS 1.0 ca. 1996, deployments ~1998 Fundamental request-grant upstream MAC layer definition

More information

Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks

Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2008, Article ID 573785, 14 pages doi:10.1155/2008/573785 Research Article Performance Optimization for Delay-Tolerant

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

P D1.1 RPR OPNET Model User Guide

P D1.1 RPR OPNET Model User Guide P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,

More information

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Media Access Control Protocol Based on DOCSIS 1.1

Media Access Control Protocol Based on DOCSIS 1.1 Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Upstream Channel Bonding

Upstream Channel Bonding First Published: November 16, 2009 Last Updated: June 16, 2014 The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information